EFiX USB Dongle Off To A Rocky Start

According to InsanelyMac forum member [qbattersby] the EFiX USB dongle he just received doesn’t seem to live up to expectations. We covered the EFiX when it was announced back in June. It’s designed to let you install OSX unmodified on commodity hardware. While using a MSI G965M motherboard, instead of installing OSX [qbattersby] was greeted with a flashing cursor with no option to continue onward.

A quick glance at the EFiX hardware compatibility chart does not list the MSI G965M as a board verified to work with the dongle and could explain [qbattersby] results. To his defense, he does explain that he will be testing it on a supported motherboard along with a retail copy of Leopard in the future. Hopefully, he will be able to post back that it works and his experience with the installation of Leopard.

While the EFiX seems to be shipping in some countries, enthusiasts in the US will have to wait a bit longer till distribution channels can be worked out.

One thing is for sure, if you do plan on going the EFiX route, make sure that the hardware you plan on using is listed on their site.

[via Engadget]

Securing DNS On OSX


It’s been a few weeks since [Dan Kaminsky] announced the nature of the DNS vulnerability and allowed 30 days of non-disclosure for patches to be applied before details of the exploit went public. Unfortunately, the details were leaked early and it didn’t take long for a functional exploit to be released into the wild. Since then, many ISPs have taken steps to prevent their users from falling victim to the attack, and BIND, the widely-used DNS protocol implementation, was updated to minimize the threat. Even then, there were reports of a version of the attack being actively used on AT&T’s DNS servers.

Mac OSX uses a BIND implementation but as of yet, Apple has not released a patch updating the system (Microsoft, on the other hand, patched this up on July 8). As a result, machines running OSX are at risk of being exploited. Individual users are less likely to be targeted, since the attacks are directed towards servers, but it’s not a smart idea to leave this vulnerability open. [Glenn Fleishman] has published a way to update BIND on OSX manually, rather than waiting on Apple to patch it themselves. It requires Xcode and a bit of terminal work, but it’s a relatively painless update. When we tried it, the “make test” step skipped a few tests and told us to run “bin/tests/system/ifconfig.sh up”. That allowed us to re-run the tests and continue the update without further interruption. [Fleischman] warns that people who manually update BIND may break the official update, but he will update his instructions when it happens with any possible workarounds. Unfortunately, this fix only works for 10.5 but alternative, yet less effective methods may work for 10.4 and earlier.

If you’d like to know if your preferred DNS servers are vulnerable or not, you can use the DNS checker tool from Doxpara. As an alternative to your ISP’s DNS servers, you can use OpenDNS, which many prefer for its security features and configuration options.

Behead Your Laptop


[Mark] sent in this nice trick for breathing new life into an old laptop. [Sarc] had a tibook with a broken LCD. It was still usable with an external monitor, so he simply removed the broken LCD. The tibook (and MacBook) uses a magnetic sensor to monitor the LCD position. To put the machine in the right mode, he taped a magnet in place to make the machine think that the display was in the closed position. To really clean things up, he mounted all the hardware under the desk and used a wireless keyboard and mouse with the machine.

IPhone 3G: Under The Hood


TechOnline has cracked open the iPhone 3G to find out what makes it tick. They’ve released detailed diagrams as well as some videos of the dissection.

Calling this an incremental update, they note that the changes seem to be additions and improvements rather than a total rebuild of the original platform. They get into the nitty gritty, discussing not only the layout and structure, but even the importance of each chip manufacturer.

Some of the improvements are obvious, like 3G. Others include the battery not being permanently attached, and the headphone jack being flush mounted. Most of the changes were in who manufactured each chip.

[via TUAW]

IPhone Dev Team Releases Jailbreak Video

[youtube=http://www.youtube.com/watch?v=R63lKICiWfg&hl=en&fs=1]
The iPhone dev team, notorious for jailbreaking the iPhone has just released a video of the iPhone 3G hacked. Keep up to date with it and watch for a release on their blog. This is a major update to the PwnageTool which is already available for previous versions of the iPhone.

They have added a lot of new features such as: canned web searches, custom installer configuration, and custom root partitions. They promise to release it soon, but state that it will not be this weekend. You can get a the high resolution version of the video from our mirror.

Engadget Goes In Depth With The IPhone 3G


Over at Engadget, they’ve taken some time to completely review the iPhone 3G. Take a few moments to stop reading about all the trouble activating them and read about the phone itself.

In short, they hit the following points:

  • The case feels thinner than it is.
  • The shape of the case makes it wobble on a hard surface.
  • Call quality is greatly improved.
  • Speeds are greatly increased.
  • Battery life is underwhelming.

They seem positive in their conclusion, we’ll have to wait and see how they feel after a little more time with it.

ARDAgent.app Still Vulnerable


When Apple pushed their most recent security update, the first thing we checked was whether the ARDAgent issue was fixed. It’s not. This vulnerability lets anyone execute code as a privileged user and versions of this attack have already been found in the wild. While several Ruby, SMB, and WebKit issues were addressed it, ARDAgent is still unpatched. [Dino Dai Zovi] has published the method by which ARDAgent actually becomes vulnerable: when it starts, it installs its own Apple Event handlers and calls AESetInteractionAllowed() with kAEInteractWithSelf. This should restrict it only to its own events, but for some reason that’s not the resulting behavior. He also pointed out that SecurityAgent has displayed similar weirdness; it is vulnerable to Apple Events even though it doesn’t calls an Apple Events function. We can see how this unexpected behavior could make patch development take much longer and may end up uncovering an even bigger problem. Check out [Dino]’s post for more information.